Tag: Malware

1
Oct

Top 5 Causes of Data Breaches: Protect Your Organization

Written by: Jay H. You may think your small business is an unlikely target for cybercriminals. Unfortunately, that isn’t the case. Approximately 43 percent of cybersecurity breaches target small and medium businesses, meaning your organization is in direct sight of attackers. Luckily, you can fight back against hackers and take steps to protect yourself and your organization. Let’s go over

Read more

25
Aug

What Is Spyware And How Does It Work?

Written by: Jay H. Spyware is an umbrella term for a form of malware (malicious software) that bad actors install on a victim’s computer without their consent. It then spies on the user, steals personal information – including browsing history, login information, and sensitive information – and relays the data to third parties. Spyware is one of the most common

Read more

14
May

How To Reduce Cyberattack Risk For Your Organization

Written by: Jay H. Every business is at significant risk of a cyberattack. Indeed, 42 percent of businesses experienced a cyberattack in the last year, yet many businesses still do not take action to defend themselves. Reducing your firm’s cyberattack risk should be one of your biggest priorities in order to prevent costly breaches. Here are some ways you can

Read more

1
May

Nearly 30% Of Critical WordPress Plugin Vulnerabilities Unpatched

Written by: Jay H. Data breaches are an area of major concern nowadays. Cybercriminals constantly search for new vulnerabilities to exploit and data to steal. However, a shocking report from WordPress security provider PatchStack reveals that nearly 30 percent of flawed WordPress plugins never receive an update. Plugins increasingly vulnerable 2021 experienced a 150 percent increase in the number of

Read more

2
Apr

How To Secure Your Mobile Phone

  Written by: Jay H. Cybersecurity is a hot topic nowadays. Seemingly every day, there are new headlines of businesses and websites getting hacked. However, did you know your phone is also susceptible to hackers and malefactors? Luckily, you can take steps to improve your device’s security. Here is how to secure your mobile phone. Lock Your Device If your

Read more

25
Nov

What Is Endpoint Detection And Response?

Written by: Jay H. Every device on your business network poses a threat. Your computers, mobile devices, servers, and even printers are all vectors hackers can use to breach your organization. So, how do you know if suspicious activity occurs? What if attackers compromise a device? Endpoint detection and response (EDR) aims to address these challenges, using continuous monitoring to

Read more

30
Sep

Cybersecurity Agencies Reveal Top Targeted Vulnerabilities

Written by: Jay H. A joint security advisory issued by the top cybersecurity agencies reveals the most targeted vulnerabilities by cybercriminals over the past two years. The USA’s Cybersecurity and Infrastructure Security Agency (CISA), the USA’s Federal Bureau of Investigation, the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC) also shared details on these security

Read more

31
Jul

Beware Of Fake Windows 11 Installers Riddled With Malware

Written by: Jay H. Hackers waste no time taking advantage of the hype surrounding major events. The announcement of Windows 11, Microsoft’s newest operating system, is no exception, and criminals have already started pushing fake Windows 11 installers laced with malware. Although Windows 11 isn’t officially available for the general public until late 2021, Microsoft has made it available to

Read more

22
Jun

Manufacturing Firms: The Biggest Ransomware Targets In 2021

Written by: Jay H. According to a new report from a Canadian international managed service provider, manufactured goods producers were the biggest ransomware targets in the first half of 2021. In the recent report issued by the Herjavec Group, 39 percent of victims listed on the data leak websites run by ransomware groups broadly fell into the manufactured goods category.

Read more

21
Jun

3 Ransomware Myths That Put Your Business At Risk

Written by: Jay H. If you’ve paid any attention to recent news, you’ve likely seen ransomware stories dominating major headlines. The Colonial Pipeline cyber attack is just one example of the devastation a cyberattack can cause. However, many small-medium business (SMB) owners still don’t consider themselves to be at risk despite the abundance of cyberattacks. Unfortunately, this couldn’t be further

Read more